Ticketmaster & Others Hit by Massive Data Breach
At the end of last month, Live Nation, owner of Ticketmaster, reported that it had “identified unauthorized activity within a third-party cloud database.” The result of this data breach is the exposure of over 560 million users. A hacker group known as ShinyHunters has claimed responsibility for the attack.
ShinyHunters allegedly stole 1.3 terabytes of data, including customer names, email addresses, phone numbers, order details, and partial credit card numbers. Ticketmaster is now facing a class action lawsuit due to this breach.
The attack appears to be a part of a larger data breach of the cloud storage platform, Snowflake, of which Ticketmaster is a customer. According to WIRED, other impacted companies include Santander Bank, Advance Auto Parts, and LendingTree, though the size of these breaches is unknown. ShinyHunters allegedly obtained the data by infecting the personal computer of a Snowflake employee.
The Bottom Line: If you are a user of any of these services, especially Ticketmaster, be sure to update your passwords and enable multi-factor authentication where possible. To ensure maximum protection, be sure to use unique, strong passwords for every account so that when a breach happens, attackers cannot use the same password to access other accounts.
International Operation Takes Down Massive Botnet
The US Justice Department led a joint operation with law enforcement partners around the world to take down a massive botnet responsible for worldwide cyber attacks, which infected over 19 million IP addresses. YunHe Wang, a 35-year-old People’s Republic of China national and St. Kitts and Nevis citizen-by-investment, was charged with deploying malware, as well as creating and managing a residential proxy service known as “911 S5.”
Wang’s malware was used to compromise millions of computers around the globe and then offered cybercriminals access to the infected machines for a fee, allowing him to amass millions of dollars. According to Attorney General Merrick B. Garland, 911 S5 “facilitated cyber-attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations.” Wang has been arrested, and the 911 S5 botnet has been brought down. Garland has vowed to “unmask and arrest the cybercriminals who profit from this illegal activity.”
The Bottom Line: While you probably don’t need to worry about getting hacked by international cybercriminals, this operation shows that the world’s governments take cybercrime very seriously. It’s also a heartening example of the U.S. being able to rely on its allies around the world to coordinate the takedown of massive international cybercriminal conspiracies.
Ransomware Attack Brings Down Change Healthcare
Back in February, UnitedHealth Group-owned Change Healthcare was hit by a ransomware attack. While we reported on this in March, UnitedHealth has only now confirmed the details of the attack, which has resulted in the exposure of personal information, such as names, addresses, emails, social security numbers, driver’s license numbers, and more. Additionally, Change says that medical data, including insurance plans, billing, claims, and banking details, was stolen. However, the company says that this does not mean every customer has been impacted by the same level of exposure and that the type of data that was stolen may vary from person to person.
This breach led to outages of Change Healthcare’s systems across the country, which meant doctors and pharmacies could not file or process claims. This left many customers unable to get their prescriptions or pay full price for them. United Health allegedly paid a ransom to prevent the data from being posted online and will begin the process of notifying all affected customers starting in July.
The Bottom Line: Not even health insurance companies are safe from cyberattacks. If you are a customer of Change Healthcare, be on the lookout for an email or a letter that indicates that you were affected by the breach. However, also be wary of scams that might try to take advantage of this attack. If your information is online, bad actors could use that information against you in phishing attempts or try to pressure you into paying them money. If you receive suspicious emails or phone calls, always double-check the sender or phone number to make sure they’re coming from a trusted source. Email address domains will almost always be the company’s website, not a Gmail, Yahoo, or iCloud address. In the case of phone calls, it’s always best to hang up and call the company back at an official phone number, like the one listed on Change Healthcare’s customer support page.
More than 600,000 Routers Brought Down by a Single Hacker
An unknown hacker managed to deploy a remote access trojan called Chalubo to more than 600,000 internet routers belonging to an unnamed ISP back in October 2023. Ars Technica identified the ISP as Windstream, based on reports that Windstream subscribers began to experience issues around the same time that the trojan was deployed. However, Windstream and Black Lotus Labs, the security firm that first reported the incident, have neither confirmed nor denied this.
The motivations of the attack are as mysterious as the hacker. No one knows who perpetrated this attack or why, but the result was over half a million internet routers being bricked, a state in which an electronic device ceases to function and becomes as useful as a brick. The ISP involved was quick to replace the routers of all affected customers, but many details of how the attack was carried out are still up in the air.
The Bottom Line: While this attack was widespread and affected a massive number of customers, you likely do not need to worry too much about this type of attack. If a repeat incident were to occur, the worst-case scenario likely means you will simply be without internet for a few days while the ISP sends out a new router. However, you should still exercise caution when browsing the web, only download files from trusted sources, and avoid entering login credentials on suspicious pages.
Tile Customer Data Falls into the Hands of Hacker
In an online chat with 404 Media, a hacker revealed that they gained access to an internal tool used by location tracker company Tile. This tool is designed to be used by employees and law enforcement to obtain the location of specific Tile devices. The tool can also be used to change ownership of Tile devices, create administrative users, or send push notifications to users. The hacker attempted to extort Tile for payment, but the company did not respond. Instead, Tile says the hacker accessed a customer support platform that “contains limited customer information, such as names, addresses, email addresses, phone numbers, and Tile device identification numbers. It does not include more sensitive information, such as credit card numbers, passwords or login credentials, location data, or government-issued identification numbers.”
The Bottom Line: If you’re a Tile user, this might be a good time to switch to Apple’s AirTags for the increased privacy and security. At the very least, I would still strongly recommend updating your password, even though Tile claims the hacker doesn’t have access to login credentials.